Immunity CANVAS Professional 6.65 released
Changes
Android exploit, Opera exploit, 32/64-bit ms_enableeudc, and more!
Supported Platforms and Installations
– Windows (requires Python & PyGTK)
– Linux
– MacOSX (requires PyGTK)
– All other Python environments such as mobile phones and commercial Unixes (command line version only supported, GUI may also be available)
Architecture
– CANVAS Professional’s completely open design allows a team to adapt CANVAS Professional to their environment and needs.
Documentation
– all documentation is delivered in the form of demonstration movies
– exploit modules have additional information windows
Exploits
– currently over 370 exploits, an average of 4 exploits added every monthly release
– Immunity carefully selects vulnerabilities for inclusion as CANVAS exploits. Top priorities are high-value vulnerabilities such as remote, pre-authentication, and new vulnerabilities in mainstream software.
– Exploits span all common platforms and applications
Payload Options
– to provide maximum reliability, exploits always attempt to reuse socket
– if socket reuse is not suitable, connect-back is used
– subsequent MOSDEF session allows arbitrary code execution, and provides a listener shell for common actions (file management, screenshots, etc)
– bouncing and split-bouncing automatically available via MOSDEF
– adjustable covertness level
Exploit Delivery
– regular monthly updates made available via web
– exploit modules and CANVAS engine are updated simultaneously
– customers reminded of monthly updates via email